richant.build067.wpsandbox.app
Open in
urlscan Pro
2606:4700:10::6816:4386
Public Scan
Submission: On August 18 via api from LU — Scanned from DE
Summary
TLS certificate: Issued by E1 on July 27th 2023. Valid for: 3 months.
This is the only time richant.build067.wpsandbox.app was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 2606:4700:10:... 2606:4700:10::6816:4386 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 1 |
ASN13335 (CLOUDFLARENET, US)
richant.build067.wpsandbox.app |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
wpsandbox.app
1 redirects
richant.build067.wpsandbox.app |
5 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
4 | richant.build067.wpsandbox.app |
1 redirects
richant.build067.wpsandbox.app
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.build067.wpsandbox.app E1 |
2023-07-27 - 2023-10-25 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://richant.build067.wpsandbox.app/ac/cpf.html
Frame ID: A8E378E36720F94D19048EB2F980216E
Requests: 1 HTTP requests in this frame
Frame:
https://richant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/scripts/jsd/313d8a27/invisible.js
Frame ID: 1C5437B5AAE5650012106D9BB45DD2B5
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://richant.build067.wpsandbox.app/cdn-cgi/challenge-platform/scripts/invisible.js HTTP 302
- https://richant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/scripts/jsd/313d8a27/invisible.js
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
cpf.html
richant.build067.wpsandbox.app/ac/ |
1 KB 816 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
invisible.js
richant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/scripts/jsd/313d8a27/ Frame 1C54 Redirect Chain
|
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
7f87f4211a7635e6
richant.build067.wpsandbox.app/cdn-cgi/challenge-platform/h/g/cv/result/ Frame 1C54 |
0 307 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.wpsandbox.app/ | Name: cf_clearance Value: ksoOjX9aF0Z76bHTI4f8ggm80MzgZLkKKno3HMLvFic-1692338606-0-1-ca38f663.cf7fc71f.1feb2e00-0.2.1692338606 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
richant.build067.wpsandbox.app
2606:4700:10::6816:4386
735ff0aad5f99d97c599081503ec823c707acadcfc17ba2c7732c6156483edfb
b6ca4c0aa56ca41f2c3ccb85adb3ede709d767d0ce05e29cd256597d284362a9
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855